Loading...
Loading...
Found 8 Skills
Initialize and manage the evidence collection directory for professional security audits with documented proof of findings.
Use to manage workflows, compliance, and measurement for customer references.
Use when researching, segmenting, and maintaining journalist/analyst contact lists.
Comprehensive audit logging for compliance and security. Track user actions, data changes, and system events with tamper-proof storage.
Operating system for intake, approvals, QA, and training across brand stakeholders.
Manage protocol/standard specifications that define what a system must do. Use to create, import, or update the contract that TASKs implement against.
Configure Sentry security settings and data protection. Use when setting up data scrubbing, managing sensitive data, or configuring security policies. Trigger with phrases like "sentry security", "sentry PII", "sentry data scrubbing", "secure sentry".
Track data lineage and provenance from source to consumption. Use when auditing data flows, debugging data quality issues, ensuring compliance (GDPR, SOX), or understanding data dependencies. Covers lineage tracking, impact analysis, data catalogs, and metadata management.